0% found this document useful (0 votes)
184 views

Unit-5 Notes

The document discusses creating simple interactive applications and simple database applications. It defines interactive applications as consisting of objects intended to perform tasks when triggered by user commands through a graphical user interface. Simple steps for creating interactive web applications include understanding data items and tables, designing business views, forms, reports, data structures, and event rules. Simple database applications are organized collections of data accessed through a database management system, which provides consistency, querying, security, and sharing of data among users.

Uploaded by

javidinaug77
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
184 views

Unit-5 Notes

The document discusses creating simple interactive applications and simple database applications. It defines interactive applications as consisting of objects intended to perform tasks when triggered by user commands through a graphical user interface. Simple steps for creating interactive web applications include understanding data items and tables, designing business views, forms, reports, data structures, and event rules. Simple database applications are organized collections of data accessed through a database management system, which provides consistency, querying, security, and sharing of data among users.

Uploaded by

javidinaug77
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

APPLICATION ESSENTIALS

Creation of simple interactive applications - Simple database


applications - Multimedia applications - Design and development of
information systems – Personal Information System – Information
retrieval system – Social networking applications
CREATION OF SIMPLE INTERACTIVE APPLICATION:
Definition of Interactive Application:
• An interactive application consists of a collection of objects intended for
performing certain task when user triggers the command. The non-interactive
applications operate without human involvement. For example - compiler and
batch processing applications are non-interactive applications.

• The interactive application share a Graphical user interface (GUI). The


interactive application consists of forms on which the components such as
buttons, text fields, and radio buttons are present.

• In the interactive applications one page may get linked with other pages
dynamically. Especially in case of interactive web application this linking of
the pages is through hyperlinks. This linking is based on user input.

• Typical examples of interactive web applications are online course


registration system, online shopping system and so on.
Advantages of Creating Interactive Applications:
• It increases the engagement of users in the collaborative productions. Instead
of spending lot of time on one way presentation being shared across a
PowerPoint presentation, an interactive application allows the user to engage
with the information used.

• Files can be easily shared, accessed, edited and saved. The interactive
applications boosts the communication. The information can be shared using
email, print and files.

• The documents can be annotated and effective changes can be made while
handling the interactive application. The tools such as 3D modeling,
hyperlinks, video links and other applications can be embedded within an
interactive application.

• The interconnectivity among the interactive applications allows user to have


greater availability. Users can connect to interactive applications using iOS
and Android smart devices. This helps even a novice user to handle the
application with ease and comfort.
User’s Perspective about the Interactive Applications:
• The users use the interactive application for getting their required
information. The users always want that the desired information must be
neatly arranged on the application.
There are two kinds of browsing the information:
i. Known item Searching - The known item searching is done by the users
who know what they are looking for. They know what is the particular label,
how to proceed for getting particular information and from where to leave.
They just quickly find the required information and leave.
ii. Casual Browsing type of users do not know what they are looking for.
Sometimes they do not know anything about the product or the services on
the corresponding website.

Producer’s Perspective about the interactive Application:


• Cost is a major issue while building the information architecture from
producer‟s perspective. One cannot predict the exact cost of the information
architecture. The following points should be taken in to note:
1. The organizational goals and vision must be clear to build the information
architecture.
2. The decision of the contents to be placed on the main page should be taken
prior to implementation of the architecture.
3. The information architecture must be kept away from organizational politics.
4. The site should be designed so that the intended audience will get the
satisfaction of using it.
5. All the controversial issues must be resolved during the design process,
before the application gets built.

Steps for creating Simple Interactive Web Applications


1. Understanding Data Items and the Data dictionary:
• Data item identifies the unit of information. It defines how the item can be
used. A data dictionary is a collection of descriptions of data objects or items
in a data model.

• The data dictionary is dynamic; any changes in the data item are effective
immediately for all applications that include the data item. Applications
access the data dictionary at runtime and immediately reflect modifications to
data item.
2. Understanding the Table Design:
• A relational database table stores the data that an application uses in columns
and rows. Each column is a data item, and each row is a record. One or more
tables can be used in an application.

• To create a table, the required data items are selected. These data items must
already exist in the data dictionary. Then assign the key fields as indices for
retrieving and updating the data belonging to the tables. Various operations
that can be performed on this database table‟s are- create, insert record and
delete particular record, and update some record.

3. Understanding Business View Design:


• A business view is a selection of data items from one or more tables. After
you create a table, use Business View Design to choose only the data items
that are required for your application.
4. Understanding Form Design:
• Form design is an important part of the interactive application. Applications
are composed of forms and a form is the interface between a user and a table.
This interface should present the data logically and contain the functions that
are necessary to enter and manipulate data.
• The form design task can be accomplished by placing various components
such as text boxes, Labels, Buttons, Check Buttons and so on, on the form at
appropriate locations.
5. Understanding Report Design:
• Report Design is used to present the business data stored in the database.
Report is basically some kind of template. The data is typically presented
using batch applications that access the data through business views.
• Each report is comprised of sections which are the building blocks of all
reports. Within the template, you can add, hide, remove and rearrange
sections as needed. One can create various types of reports in the interactive
applications.
6. Understanding Data Structure Design:
• Data structure is a key element of any programming language or
environment. A data structure is a list of parameters that passes data among
applications and tables or forms.
7. Understanding Event Rules Design:
Events are the activities that occur on the form of an interactive application.
Event can be initiated by user or an application. The event rules can be created
for following purposes:
1. Perform mathematical calculation.
2. Pass data from one field in the form to another field in another form.
3. Interconnect two forms.
4. Hide and display the controls using system functions.
5. Assign the value or an expression to particular field.
6. Creation of variables or programmer defined field at run time.
7. Process table input and output, validate data and retrieve record.

The areas at which the event rules are applicable are:


1. Controls: Controls are reusable components that can be placed on the form.
For eg: Radio buttons, text boxes and so on. The event can be triggered
from these controls.
2. Form Processing: Form processing means application of business logic
associated with each form. Form Processing depends on the occurrence of
specific events.
3. Table: You can create database triggers, or rules that you attach to a table by
using Table Design Event Rules. The logic that is attached to a table runs
whenever any application initiates that database event.

4. Understanding system Functions:


System Functions are procedures provided by the tool and are usually specific to
the type of component being used. For example there are system functions to
hide and show fields on an application.

SIMPLE DATABASE APPLICATIONS


Definition: Database is an organized collection of data. A database management
system (DBMS) is a computer software application that interacts with the user,
other applications and the database itself to capture and analyze data.
Examples: MS-Access, Oracle, MySQL

Characteristics of Database Applications


1. Consistency: DBMS provide greater consistency to the forms of data storage.
2. Support for Query Language: To retrieve and manipulate the data efficiently
3. Multiuser Environment: Simultaneous access of the database without creating
conflicts.
4. Less Data Redundancy:
5. Relationship among Data
6. Security

Advantages of DBMS
1. Reduced Data redundancy – The database approach removes the
redundancy by integrating the files. This approach cannot eliminate redundancy
completely but can control the data redundancy.
2. Data consistency - In this approach all copies of data are kept consistent.
3. Sharing of data - The centralized stored database can be accessed by
multiple users or application programs.
4. Centralized database- Data is stored in a single repository and an authorized
access to this data is allowed. Only the administrator can give appropriate access
rights to the authentic users.
5. Data Integrity – This provides validity and consistency of stored data.
6. Improved Security – The database approach prevents unauthorized access to
data by means of user name, password, and access rights.
7. Use of Standards - Certain standards can be enforced to database approach
for data formats, naming conventions, documentation standards, access rules and
so on.
8. Backup and Recovery - The Backup and Recovery – The backup and
recovery actions can be taken in its current consistent state from inconsistent
state
9. Increased productivity - The database approach allows programmer to
concentrate on specific functionality required by the user.
10. Increased Concurrency- The database approach handles the concurrent
data effectively. The loss of information or integrity is avoided in this approach.
11. Improved Maintenance

Disadvantages of DBMS:
Complexity – Difficult to implement
Size - Large storage space
Cost - The multiuser database management system is very expensive.

Data Models
They describe the logical structure of a database, relationship between the
database stored in database and various constraints on data.
Importance of Data Model
1. End users have different view for data.
2. Data model organizes data for different users.

Types of Data Model:


1. Hierarchical Model:
In this model, each entity has only one parent but can have several children. At the
top of the hierarchy there is only one node called root. This model represents the
relationship in 1:N types.

Advantages:
This model groups the data into tables and defines the relationship between the
tables.
Disadvantages
• For searching any data, we have to start from the root and move downwards
and visit each child node. Thus traversing through each node is required.
• For addition of some information about child node, sometimes the parent
information needs to be modified.
• It fails to handle many to many relationships. It causes duplication and data
redundancy.

2. Network Model:
This is enhanced version of hierarchical model. It addresses the M:N relationship .
i.e No single parent concept. So, any child in this model can have any number of
parents.
Advantages:
1.Capability to handle more relationships: Since the network model allows many
to many relationship, it helps in modeling real life situations.
2.Ease of data access
3.Data Integrity

Disadvantages:
1.Complex to implement, Complicated Operations, Difficult to change structure.

3. Relational Model:
In a relational model, the data is stored in the form of tables. The database
systems based on it are called relational database systems. These tables are
related to each other.

Advantages:
1. The database design is simple to implement and manage.
2. In this model, the table is an entity which is primarily used. Hence insertion,
deletion and retrieval of data become easy.
3. The data can be easily linked with other table, using the table attributes.
4. It facilitates the support for SQL languages.
5. It ensures the structural independence.
Disadvantages:
1. It has substantial hardware and software overhead.
2. It can facilitate to poor design and implementation.
3. It cannot handle the data in the form of images, audio or video.

4. E-R Model:
This model is basically used to design the relational database systems; the
primary purpose of E-R Model is to show the relationship between various data
objects. The object relationship pair can be graphically represented by a diagram
called Entity Relationship Diagram (ERD).

Components of ERD:
Entity: An entity is an object that exists and is distinguishable. It is similar to a
record in a programming language with attributes and entities are represented by
rectangle.
Relationship: An association among several entities. It is represented in
diamond. Relationship may have attributes and have cardinality (e.g. One-to-
many).
Attribute: It is drawn in ellipses. It is similar to record fields in a programming
language. Each attribute has a set of permitted values called domain.
Notations used in ER Diagram:
• Entity: It is an object and distinguishable it is similar to record.

• Weak Entity: When this entity is dependent upon some another entity then it
is called weak entity.

• Attribute: The attributes are properties or characteristics of an entity.

• Derived attribute: It is a kind of attribute which is based on another attribute.

• Key attributes: A key attribute is an unique attribute representing


distinguishing characteristics of entity. Typically primary key of record is a
key attribute.

• Multivalued attribute: A multivalued attribute have more than one value.



• Relationship: When two entities share some information then it is denoted by
relationship.
Example: Draw an ER diagram for the relationship of teacher, and courses.
Also specify the association, cardinality and modality.
Association: In the above ER diagram, a relationship conducts is introduced.
“Teacher” is associated with “Course” by conducting it.
Cardinality: Many Teachers can conduct the single course.
Modality: For conduction of a course, there must be a Teacher. There may be a
situation that a Teacher is not conducting any course.

Advantages:
1. Simple to design.
2. Visual Representation.
3. Easy Conversion to tables.

Disadvantages:
1. Limited Specification.
2. High level design.
3. No industry standard.
Architecture of Database Systems:
The database system architecture represents the structure and layout of the data
stored in it. The architecture of database system can be from single tier to
multitier. The multi-tiered system divides the whole system into multiple
modules. Each of these individual modules can be independently altered or
modified.
Database Tier:
• This is the layer at which the actual database resides. In this layer, all the
tables, their mappings and the actual data present. When you save your
details from the front end, it will be inserted into the respective tables in the
database layer, by using the programs in the application layer.
• When the user wants to retrieve the data from this database, the database
layer fires the queries to get the data from the tables present in the database.

Application Tier:
• This layer sends the requests made by the users of presentation tier to the
database tier and returns the response from database tier to presentation tier.
The layer has all the business logics like validation, calculations and
manipulations of data.
• If this layer sees that the request is invalid, it sends back the message to
presentation layer. Hence, the application layer sits in the middle and acts as
the mediator between the users and the database.
Presentation Tier:
• This layer is made up of the users who use the database. These users have no
knowledge of underlying database. At this layer multiple views of the
database are provided.

Data Independence:
Definition: Data independence is an ability by which one can change the data at
one level without affecting the data at another level. Here level can be physical,
conceptual or external.
Data independence is one of the most important characteristics of database
management system. By this property, the structure of the database can be easily
modified by without changing the application programs. There are two types of
independence:

1. Physical Independence:
This is the kind of data independence which allows the modification of physical
schema without requiring any change to the conceptual schema. For example – if
there is any change in memory size of database server then it will not affect the
logical structure of any data object.
2. Logical Independence:
• This kind of data independence allows the modification of conceptual
schema without requiring any change to the external schema. For example –
Any change in the table structure such as addition or deletion of some
columns does not affect user views.
• By these data independence the time and cost acquired by changes in any
level can be reduced and abstract view of data can be provided to the user.
Data Dictionary:
• Data dictionary contains information about database itself. The data
dictionary thus contains the metadata i.e. data about data. Following types of
information is stored in data dictionary:
 Definition of database objects such as tables, views, constraints, clusters,
procedures, functions, triggers
 Column name
 Data type information
 Amount of space required to store the data object
 Default field values
 Access rights
 Database usernames – Schema information
 Last updated or accessed information

• All this information can be stored in tables , XML files or in spreadsheet. The
data dictionary is updated automatically by the database systems when user
issues the corresponding queries.
Keys used in Database Applications
Keys are important in relational database in order to establish the relationship
between the tables. The keys are also used to access the records in the database
table. Following are the various keys that are used in database system.

1. Primary Key:
This is the most important key in database which uniquely identifies the record.
It can be a single attribute or combination of attributes. The database designer
has to specially assign one of the candidate keys as primary key so that the
record can be uniquely identified with the help of it.
For example – Stud_RollNo is a primary key from the student database.

2. Candidate Key:
A candidate key is a single field or the least combination of fields that uniquely
identifies each record in the table. But the individual attribute cannot identify the
record uniquely.
For example – FirstName, LastName, Address in combination can uniquely
identify the record, but individually FirstName, LastName or Address cannot
uniquely identify the record.

4. Composite Key:
The key that consists of two or more attributes that uniquely identifies an entity
occurrence is called Composite key. For example to identify the Student taking
particular course we can uniquely identify such type of record by combining two
or more columns from the same table. Hence, Stud_RollNo and CourseId
together form a composite key.
4. Foreign Key:
A Foreign Key is generally a primary key for one table that appears as a field in
another where the first table has relationship to the second. For example:
consider the following student table in which CourseID is a foreign key.
MULTIMEDIA APPLICATIONS
• The word multimedia means more than one media for conveying
information. The multimedia can be defined as:
• Computer- based techniques of text, images, audio, video, graphics,
animation, and any other medium where every type of information can be
represented, processed, stored, transmitted, produced and presented digitally.

Examples:
• Some of the important programs are listed below in some categories. They
are:
 Maya, Flash, Blender, comes mainly under graphics category.
 Interactivity category basically includes MySQL, AJAX, Flash and Flex
and PHP.
 Audio category is of sound slides, Pro-tools, Adobe Auditions and
more.
 Similarly programs in video category are Canopus Edius, i Movie,
Flash Video Encoder, Final Cut Pro.
 Text programs are like Word press, InDesign, and Dream Weaver.
Components of Multimedia:
1. Text can be added for giving emphasis.
2. Graphics are added for visual impact. A picture is worth a thousand words.
Graphics enhance presentation.
3. Voice or audio enhance presentation by adding persuasion.
4. The animation is for attracting attention. A chart can be focused more
quickly by adding animation to it.
5. Video is multimedia can be used for providing clear instructions.

Uses of Multimedia:
1. Education
• Multimedia is extensively used in the fields of education and training. Even
in conventional method audio visual techniques for imparting education like
charts, model etc. were used. Now a days the classroom need is not limited to
that conventional method rather it needs audio and visual media.

• The software package named computer aided instruction is available that


provides a friendly interactive method of learning.
2. Training
• There are various systems and intelligent tutoring systems available to train
the students in many areas starting from the mathematics of a primary student
to a difficult surgical process for a medical student.

3. Business
• The business application of multimedia includes, product demos, instant
messaging. One of the excellent applications is voice and live conferencing.

• The quality of business communication can be enhanced by multimedia.


Product promotion, customer information, communication to employee can
be done by multimedia.

4. Games and Entertainment:


• Real life games can be created by multimedia. Developers use sound,
animation, graphics using multimedia to create games. Flight simulator tool
creates real life imaging.
INFORMATION SYSTEM
Definition: An Information System (IS) is a set of interrelated components that
collect, manipulate, store and disseminate data and information and provide a
feedback mechanism to meet an objective.

Examples
1. Supply Chain Management: This system is for managing the flow of goods
and services that involves the movement and storage of raw materials, work-
in-progress inventory and finished goods.
2. Customer Relationship Management: Manages communication and
marketing initiatives directed at customers.
3. Geographic Positioning System (GPS): it provides driving directions and
desired locations.
4. Enterprise Resource Planning (ERP): It is an information system used to
integrate the management of all internal and external information across an
entire organization.

• The parts of information system are: Input, Processing, Output and Feedback
1. Input:
• Input is an activity of gathering and capturing raw data. For example- in
online student information system, instructor has to submit the detailed
information of students so that the summary of students information can be
compiled.

2. Processing:
• Processing means converting or transforming data into useful output.
• Processing can involve calculations, comparing data and taking alternative
actions, and storing data for future use. For example – in tax management
system – the tax needs to be calculated using the data such as gross salary,
insurances, other deductions and so on.
• Processing data into useful information is critical in business settings.
Processing can be done manually or with computer assistance. After
processing the data results are typically stored in storage.
3. Output:
• Output involves producing useful information in the form of documents or
reports.

• For example – in online banking system, the report is getting generated on


the current transaction and can be presented to the customer in the form of
bank statement. This statement shows the details of all the transactions and
the current available balance in the account.

4. Feedback:
• In information system, feedback is information from the system which is
used to make changes to input or processing activities.

• For example, errors or problems might make it necessary to correct input


data or change a process. For example, in payroll processing, perhaps the
number of hours an employee worked was entered as 400 instead of 40.

• Feedback is very important to managers or decision makers in order to


modify the system.
Characteristics of Information System
• Accessibility: Information present should be easily accessible by authorized
users.
• Accurate: The information must be accurate and error free.
• Complete: Information present must be complete and should satisfy all the
queries of its users.
• Relevant: The relevant information is important for the decision maker.
• Reliable: The reliable information is trusted by the users. The reliability of
information depends upon the sources of data collection for the information
systems.
• Secure: The information systems must be secure and prevent any unauthorized
access to it.
• Simple: The information system must be very simple to handle and not very
complex. It should not present the information with too many details whereby the
decision maker is unable to determine what is really important.
• Timely: The information in the information system must be delivered in timely
manner whenever it is required.
• Economical: Information must be economical to produce.
• Verifiable: The information must be verifiable and correct.
Components of Information Systems
• Hardware: Computer-based information systems use computer hardware,
such as processors, monitors, keyboard and printers.
• Software: These are the programs used to organize process and analyze data.
• Databases: Information system work with data, organized into tables and
files.
• Network: Different elements need to be connected to each other, especially
when different people in an organization use the same information system.
• Procedures: These describe how specific data are processed and analyzed in
order to get the answers.
Types:
Various types of information systems are:
1. Transaction Processing System (TPS):
• The transaction processing system provides way to collect, process, store,
display, modify or cancel the transactions.
• This system allows multiple transactions to take place simultaneously.
• The data collected by this system is typically stored in databases which can
be used to produce reports such as billing, inventory summaries and
manufacturing schedules.
• Examples- payroll system, order processing system and stock control
systems.

Properties of Transaction Data (ACID PROPERTIES)


• Atomicity: The transaction must occur completely or not executed at all.
Example: Withdrawal from one account and deposition in other account
completes one complete transaction.
• Consistency: The data written in the dB must be valid data. This validity
must be based on the constraints, triggers and other combinations.
• Isolation: If transaction is executed concurrently then it may come to some
state. If transaction is executed sequentially then it may come to some other
state. The isolation property ensures that these two states are equal.
• Durability: A transaction is said to be durable if it is committed and remains
in the state even in case of power failure or system crash. To satisfy this
property the transaction must be recorded in non- volatile memory.

2. Management Information System (MIS):


• A management information system is an information system that uses data
collected by Transaction Processing System (TPS).
• This data is used for creating reports in such a way that managers can make
use of it to make important business decisions.
• Some reports are created to present the summary. These activities are
performed to increase the efficiency of managerial activity.
• Examples- Sales management system, Inventory control system, Budgeting
system, Management reporting system, Personnel system.

3. Decision Support System (DSS)


• The decision support system helps make decision by working and analyzing
data that can generate statistical projections and data models.
• This system gives support rather than replacing a manager‟s judgment while
improving the quality of a manager decision.
• The DSS helps solve problems while using external data.
• Examples- Logistics systems, Financial Planning systems, Spreadsheet
models

4. Executive Information Systems (EIS)


• It is strategic level of information system that is present at the top level of the
pyramid.
• It helps executives and senior managers analyze the environment in which
the organization operates, to identify long-term trends, and to plan
appropriate courses of action.
• EIS organizes and presents data and information from both external data
sources and internal MIS or TPS in order to support and extend the inherent
capabilities of senior executives.
• EIS emphasizes graphical displays and easy-to-use user interfaces.
• In recent years, the term EIS has lost popularity in favor of business
intelligence.
• Examples – Financial Analysis system
Design and Development of Information System
1. Feasibility study:
• The aim of a feasibility study is to see whether it is possible to develop a
system at a reasonable cost. At the end of the feasibility study a decision is
taken whether to proceed or not.

• A feasibility study contains the general requirements of the proposed


systems. It may be that development of a new system is not needed instead
an update of the existing is enough.

2. Requirement Analysis:
• This is very important part in the development of an Information System and
involves looking at an organization or system and finding out how
information is being handled at the moment.

• The stage where users and IT specialists work together to collect and
comprehend the business requirements. Based on requirements, both will
work on the design and discuss the tasks to be done.

• The requirement analysis document is prepared at the end of this stage.


3. Design
• At, this stage the system blueprint is created.
• The technical architecture is designed which includes telecommunications,
hardware and software suited for the system.
• The design process include: Outputs, Inputs, File Design, Hardware, Software
• The system design should be done for: user interface, data design, process
design

4. Development and Testing
• Any new system needs to be thoroughly tested before being introduced.
• During this stage the building of the technical architecture, database and
programs are executed.
• It is also the stage where the system is tested using the established test scripts
and compared with the expected outcomes to actual outcomes.

5. Implementation:
• The stage where system is in place and is used by the actual workforce. User
guide manual and training are provided to users.
6. Evaluation
• During this stage system is evaluated for any bug from time to time.

7. Maintenance
• This is the stage where system needs to be enhanced or strengthened in order
to meet the goals of the organization.

PERSONAL INFORMATION SYSTEM


• Personal Information management is set of activities in which people
perform in order to acquire, organize, maintain, retrieve and use personal
information such as documents, web pages, email messages every day to
accomplish the assigned tasks.

• Personal Information System (PIS) maintain the information about the


employees like personal, promotional, postings, qualifications, awards,
incentives, leave etc. That assists an organization in many ways.

• There are various roles in the personal information system such as-
employee, manager, customer, and student and so on.
• Conceptually PIS is of collection information and methods that help the people to
maintain the information of persons.
• This information system can be maintained offline. One can carry this information
system even in pen drive.
• Example - Address book system, Personal Notes, Email notification, Reminders
and Alert system, Lists, Personal File collection system(document, music, photos),
Instant messaging systems

Need for Personal Information System:


• This system saves times and efforts in locating the information.
• Information system is used for fast retrieval of information.
• The information system organizes the entire information systematically.
• Personal information system in an organization provides better employee
productivity and better team work in the near term.

Functionality of Personal Information System


There are two modes of functionality of personal information system:
1. User panel: The user panel is for entering the personal information such as profile
details, qualification details, and employment details.
2. Administrator panel: The administrator panels maintain following activities like
user settings, profile master, qualification master, and document upload master, email
settings, printer settings.
Benefits of Personal Information System:
• Personal information system contain the data of all its users.
• Users can easily search and locate data with personal information
management system.
• Information stored in personal information system is transferrable to other
locations.

Exercise: Design a simple personal application that gives you reminders for
each day. Identify the inputs to be taken, processing to be done, and the
output to be produced . What multimedia components can be added to this
application?
• The personal application for reminder is a simple and effective application
that can be used in a busy schedule for reminding the day to day activities.
Features of this application:
• Users can set / update date / time of particular event.
• The history data can be cleared.
• Priority of task can be set or changed.
• One can feed to-do list to the application.
• The meeting schedule can be input to the application. The remaining
application will display the schedule one hour prior to actual schedule.
• The birthdays, anniversaries or important dates can be reminded on particular
dates by flashing images, messages and ringing alarm. Users can stop the
alarm or press „remind me‟ after sometime button.
• Email data via, name of person, email address, and phone number and so on
can be used by the application as input. This feature can be set if user permits
to do so.
• The day / date / time can be set according to appropriate time zone of the
country.
The sample GUI for per simple personal application that gives you reminders is
as follows:
• Input: Name of the person, birthdate, anniversary date, meeting time, purpose
of meeting, allotted timing for meeting.
• Processing: It involves making calculations, matching data against system
date, matching person name, storing data for future use.
• Output: Displaying reminder information on the device, displaying date,
ringing alarm, flashing light.

Multimedia Components:
• Text: The text is used for typing the input to the system as well for displaying
the name of the event, detailed information about some schedules, to-do list,
and name of the person and so on.
• Graphics: The attractive graphics flashing as output, matching with date or
time of particular event.
• Image: The image / photo of the persons can be displayed on the app while
reminding the birthdays and anniversaries.
• Audio: Melodious songs or ringtone will be ringing for the reminder alarm.
• Animation: Animated images or text can be displayed on the device for
reminding app on particular event.
INFORMATION RETRIEVAL SYSTEM (IRS)
• Information retrieval is the activity of obtaining information resources relevant to
an information that is needed from a collection of information resources.
• The information retrieval process begins when user submits the query to the
system. Queries are formal statements of information need. The user queries are
matched against the database information.
• Most of the information retrieval systems compute the numeric score on how well
each object in the database matches the query and rank the objects according to its
value.
• The top ranking objects are presented to the user.
• This process can be iterated if the user wishes to refine the query.

Various Tasks of Information Retrieval:


1. Ad-hoc Search – It allows finding relevant documents for an arbitrary text query.
2. Filtering – By this task it is possible to identify the relevant user profile for new
document.
3. Classification - The classification permits to identify the relevant labels for
documents.
4. Question Answering – User can get the appropriate answer to the submitted
question by using the information retrieval process.
Important Issues in Information Retrieval Process:
1. Relevance: The most important responsibility of IR system is to present
relevant information to its user.
2. Evaluation: Experimental procedures and measures for comparing system
output with user expectations during retrieval of information.
3. User and information need: Search evaluation is user centered. Keyword
queries are often poor descriptions of actual information needs. Interaction and
context are important for understanding user intent. Query refinement
techniques such as query expansion, query suggestion, relevance feedback
improve ranking.

Information Retrieval and Search Engines:


• A search engine is the practical application of information retrieval
techniques to large scale text collections. Web search engines are best known
examples. For example – Google is a popular search engine.

Search Engine Issues


1. Performance: The response time for the search engine must be reduced.
Hence in search engines indexes are data structures designed to improve search
efficiency.
2. Dynamic Data: The “collection” for most real applications is constantly
changing in terms of updates, additions, deletions. Acquiring or “crawling” the
documents is a major task in case of search engine. Updating the indexes while
processing queries is also a design issue.

3. Scalability: This is the issue that deals with working with millions of users
every day, and with many terabytes of documents.

4. Adaptability: This issue is related to changing and tuning search engine


components such as ranking algorithm, indexing strategy, and interface for
different applications.

5. Spam: Spam is irrelevant or unsolicited messages sent over the internet,


typically to a large number of users, for the purposes of advertising, phishing
and spreading malware. Spam is a major issue in web search. It basically affects
the efficiency of search engines and effectiveness of the results.
General Architecture of Search Engine:
Step 1: The important module is Web crawler. It constantly send the crawlers
to the web for crawling different web sites. It then extracts web pages from
WWW (world wide web) constantly.
Step 2: The pages brought by web crawler are then stored in page repository. The
page repository is nothing but a temporary store for these web pages.

Step 3: The web pages are then sent to Indexing module. This module extracts
the key element contents such as title tag, image tag, description tag, and internal
links and so on. The set of indices are prepared from the extracted contents present
on the web pages.

Indexing process is performed in three steps:


1. Text acquisition – Identifies and stores documents for indexing.
2. Text transformation - Transforms documents into index terms or features.
3. Index creation – Takes index terms and creates data structures (indexes) to
support fast searching.
These indexes can be content index, image index, video index and so on. Then
the contents are systematically arranged and ready to be submitted to the search
engine when the query is fired. The steps 1 to 3 routinely get executed whether or
not the search engine is in execution. These modules are query independent
modules.

Step 4: User Interface module displays the search engine web address (say
Google) using which the user can type the query.
Step 5: This query is then submitted to Query module, which breaks down the
query and transforms it in a language which the search engine can understand.
This query module then collects the results from indexes and passes these results
to Ranking module.

Step 6: The task of ranking module is to filter the contents and put them back
on the user interface according to their ranking. Based on the popularity of the
modules the rank of the web pages is decided.

Step 7: Then the user gets the result displayed on the user interface. If user
want to get the result of particular type of information (images), then the query
module need to be changed. And then the ranking module need to be changed so
that it can display only the images and not the text contents.
Examples of Popular Search Engines
SOCIAL NETWORKING APPLICATIONS
• Social networking applications are online technologies that allow users to
communicate with each other.
• Most popular social networking applications are developed with a purpose of
looking for people with common interests to give them an opportunity to
discuss various topics, videos and photos, add each other to the friends
category, upload music etc..
• One of the largest advantages of social networking application is the
opportunity to find your old friends and relatives. Apart from that, social
media has a great potential to create virtual jobs.

Types of Social Networking Applications


1. Messengers Applications
• For chatting purpose the messenger applications are created. Messenger is a
mobile app or web services for instant messaging. In addition to common
talks with friends, messengers are actively used in business.

• They make it possible to provide the client with timely service. The most
popular messengers today are Whatsapp, Facebook Messenger and so on.
2. Live Streaming Applications
• Live streaming apps are gaining wide popularity day by day. Live stream
video is interesting for consumers because it‟s a more of an authentic
advertising type, rather than an already edited video clip.
• For example, the company can show how they manufacture their goods, hold
various contests, raffle some gifts and so on. Different social media apps like
Periscope, Meerkat dominate the social media apps sector.

3. Application for Inspiration


• The Do it yourself(DIY) is a buzzword for the creative users of social
networking. For example – Pinterest and Wishbone apps allow grouping
images by topics or posting them on a general board.

4. Lifestyle Application
• Fashion, movies, hobbies, sports, leisure, travel, daily routine – all these
activities make life versatile and interesting. Lifestyle apps conquer the
mobile apps market since they simplify some of our daily routines. Operator,
Foursquare Swarm, Nextdoor – are the few of the most popular applications.
5. Social Blogging Applications
• Persons having great writing skills make blogs to publish their thoughts on
social media publicly or within some group. Blogger, Tumblr are some
services that offer the blogging facility. The service allows users to post
multimedia and other content to a short- form blog.

6. Business Social Applications


People who are looking for a job or who want to develop useful contacts find
business social media applications more helpful. LinkedIn career app is familiar
to many people. It is one of the literally the largest business network in the
Internet. It is oriented directly for business. Users can build your professional
brand there, look for employees, and read professional news.

7. Anonymous Social Applications


Users who don‟t want to be recognized, but want to participate in any
discussion, can use such applications. For example- Ask.fm app is very popular
among teenagers where they can ask each other any questions. All questions are
posted in an anonymous way, but if users want, they can show their name.
Features of Social Networking Applications
1.Simple user interface
A clean, clear and clutter free interface is a must-have not only for a social
networking site. All the popular social networking sites such as Facebook,
Twitter or LinkedIn etc.. maintain a very simple and minimalistic user interface.
The choice of color for the site should be very sober – Preferably use white
backgrounds and highlight the updates etc., in light color.

2. Prominent Search Facility


Due to the vast amount of information available on social networking sites, a
good search functionality is must. The search functionality on the site however
needs to go beyond content search and it needs to expand to search in social
connections like groups, communities and so on. Top right corner is the most
recommended place for the search box.

3. Personalize user profile and Experience


One of the key features which distinguishes a social networking site from a
regular website in the personalized experience for the user. On a social
networking site, users expect the content and flow of the website as per their
likes and preferences
All the features such as user profiles with activity feeds, member update
notifications, email, private messaging between members, ability to become
friends with other members and follow members and so on enhance the
personalized user experience.

4.Notifications and Real Time Updates


The regular update or real time notification enhances the user engagement in
social networking applications.

5. Interactivity
The objective of social networking sites is to facilitate interactions between
users by actively involving users. User can share photos, videos, locations,
comments among the friends using the social networking applications.

Issues of Social Networking Applications


Various issues regarding social networking applications are –
1. Spamming
Spamming is when one person or company send an unwanted email to another
person. Spamming is used for advertising purpose on the social networking
applications.
Privacy
Privacy concern in social networking application is raised because users tend to share
lot of personal information on social networking sites. There are situations in which
users may disclose personal information, sites may not take adequate steps to protect
user privacy. Users of these services need to be careful about data theft and virus
attacks.

Notifications
Typically positive notifications are sent on social networking application. For example
Mr. X and Mr. Y are now friends – such notification in common on Facebook but there
is no notification that such and such person is removed from the friend-list. It enhances
the positive atmosphere on social networking sites.

Unauthorized Access
There is a tendency to make unauthorized access to user‟s profile using social
networking site.

Child Safety
The major issue of concern is teenagers and children make misuse of social networking
services. For instance, there is a study which suggests that children are not too far from
inappropriate content on YouTube. Overuse of social networking sites also brings the
depression and anxiety among the teenagers.
Trolling
Social networking sites such as Facebook are occasionally used to emotionally
abuse, harass or bully individuals, either by posting defamatory statements or by
forwarding private digital photos or videos that can have an adverse impact on the
individuals depicted in the videos. Such actions are often referred to as “trolling”.

Online Bullying
Online bullying also called cyber bullying, is a common occurrence due to social
networking sites and result in emotional disturbance.

Data Mining
Data mining companies can improve sales and profitability using the social
networking applications.

Social Impact of Social Networking Applications


Psychological Effects
Excessive amount of time spent on the Internet in general and social networking sites
in specific can lead to addiction to these sites and cause clinical disorder.
Researchers claim that due to social networking sites such as Facebook, person may
start feeling lonely.
Interpersonal Communication
The purpose of social networking applications is to enhance the interpersonal
communication. Old friends can be found and get in touch with each other thru social
networking sites. On the other side people start liking virtual communication and
forget to give importance to face to face communication or meeting the people.

Awareness of Rights
Workers or employees get aware of their rights due to use of social networking
applications.

Social Anxiety
Due to increasing number of messages and use of social networking applications
people get connected continuously. One cannot get his/her own space. Sometimes it
may create a negative impact on friends, relatives and thereby the social anxiety gets
increased.

Growth of Patents
There has been rapid growth in the number of patent applications that cover new
technologies related to social networking. The number of published applications has
been growing rapidly since 2003.

You might also like